First published: Fri Apr 12 2013(Updated: )
python-bugzilla before 0.9.0 does not validate X.509 certificates, which allows man-in-the-middle attackers to spoof Bugzilla servers via a crafted certificate.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
pip/python-bugzilla | <0.9.0 | 0.9.0 |
python-bugzilla | <=0.8.0 | |
python-bugzilla | =0.6.0 | |
python-bugzilla | =0.6.1 | |
python-bugzilla | =0.6.2 | |
python-bugzilla | =0.7.0 | |
Fedora | =17 | |
Fedora | =18 | |
openSUSE | =11.4 | |
openSUSE | =12.2 | |
openSUSE | =12.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-2191 is considered a high-severity vulnerability due to its potential to allow man-in-the-middle attacks.
To fix CVE-2013-2191, update python-bugzilla to version 0.9.0 or higher.
CVE-2013-2191 affects all versions of python-bugzilla prior to 0.9.0.
CVE-2013-2191 enables man-in-the-middle attacks through the spoofing of Bugzilla servers.
Yes, CVE-2013-2191 affects various versions of Fedora and openSUSE that use impacted versions of python-bugzilla.